Search Results
|
Post |
Author |
Forum
[desc]
|
Replies |
Views |
Posted |
|
|
Thread: Noob Extracting VeraCrypt MBR
Post: Noob Extracting VeraCrypt MBR
I'm a total noob when it comes to hashcat.
I have a Veracrypt HDD I fully encrypted with default settings.
Being and idiot I forgot the password. I'm pretty sure I remember the letters and numbers ... |
|
ButterToast1134 |
hashcat
|
20 |
24,697 |
01-26-2017, 12:20 AM |
|
|
Thread: Noob Extracting VeraCrypt MBR
Post: RE: Noob Extracting VeraCrypt MBR
https://passcovery.com/helpdesk/knowledgebase.php?article=48
This is what I was going off. It says when pulling the true crypt it says it when you open the file in a hex editor. So I was just assum... |
|
ButterToast1134 |
hashcat
|
20 |
24,697 |
01-27-2017, 03:40 AM |
|
|
Thread: Noob Extracting VeraCrypt MBR
Post: RE: Noob Extracting VeraCrypt MBR
Code:
--
In order to crack TrueCrypt volumes, you will need to feed hashcat with the correct binary data file. Where this data lives depends on the type of volume you are dealing with.
The rul... |
|
ButterToast1134 |
hashcat
|
20 |
24,697 |
01-27-2017, 10:23 AM |
|
|
Thread: Noob Extracting VeraCrypt MBR
Post: RE: Noob Extracting VeraCrypt MBR
Thanks but this leads me to another question. I used mask processor to generate 50 million possible passwords.
I am using
Code:
--
hashcat64.exe -m 13751 -a 0 -w 3 Z:\(hash file location) A:\(dict... |
|
ButterToast1134 |
hashcat
|
20 |
24,697 |
01-27-2017, 10:42 AM |
|
|
Thread: Noob Extracting VeraCrypt MBR
Post: RE: Noob Extracting VeraCrypt MBR
I did specify -w 3 didnt I? I put hashcat64.exe -m 13751 -a 0 -w 3
I didn't know how to use the hashcat so I was using mask processor so I can see the word list being generated. ~368h/s is on par w... |
|
ButterToast1134 |
hashcat
|
20 |
24,697 |
01-27-2017, 11:35 AM |
|
|
Thread: Noob Extracting VeraCrypt MBR
Post: RE: Noob Extracting VeraCrypt MBR
takitano Wrote: (01-27-2017, 12:16 PM)
--
-m 13741 -a 0
GTX1080 - 1231 H/s
GTX960 - 298 H/s
After 24 Hours:
GTX1080 - 1031 H/s
GTX960 - 243 H/s
Forget VeraCrypt!
--
Haha. Well to try ... |
|
ButterToast1134 |
hashcat
|
20 |
24,697 |
01-27-2017, 12:32 PM |
|
|
Thread: Noob Extracting VeraCrypt MBR
Post: RE: Noob Extracting VeraCrypt MBR
So I've run it a couple times using different algorithms and still haven't gotten it.
I am going to verify that the 512 bytes is the correct bytes I need by dd the hard drive again.
Noticed the... |
|
ButterToast1134 |
hashcat
|
20 |
24,697 |
01-30-2017, 09:11 PM |
|
|
Thread: Noob Extracting VeraCrypt MBR
Post: RE: Noob Extracting VeraCrypt MBR
atom Wrote: (01-31-2017, 10:22 AM)
--
Yes, you need the boot mode. Note that there's also a whirlpool boot mode. If you don't know which hash was used you need to run through both modes.
--
Thanks.... |
|
ButterToast1134 |
hashcat
|
20 |
24,697 |
02-01-2017, 06:40 AM |
|
|
Thread: Noob Extracting VeraCrypt MBR
Post: RE: Noob Extracting VeraCrypt MBR
Another newbie question.
I haven't had any luck yet.
Starting with Windows 7 (I think) Windows would create a 100MB partition, then your normal partition then a 450MB partition at the end for recov... |
|
ButterToast1134 |
hashcat
|
20 |
24,697 |
02-01-2017, 11:51 PM |
|
|
Thread: Noob Extracting VeraCrypt MBR
Post: RE: Noob Extracting VeraCrypt MBR
atom Wrote: (01-27-2017, 11:53 PM)
--
This has nothing to do with the hash used, it's all just the iteration count. If you iterate MD5 a million times it would be even slower.
--
I'm not understand... |
|
ButterToast1134 |
hashcat
|
20 |
24,697 |
01-28-2017, 01:32 PM |
|
|
Thread: Noob Extracting VeraCrypt MBR
Post: RE: Noob Extracting VeraCrypt MBR
I went through the keyboard and wrote down all the characters I use in my passwords. Which left me with 26 characters. Obviously 26^20 is impossible to crack.
But for the letters I always use cert... |
|
ButterToast1134 |
hashcat
|
20 |
24,697 |
02-02-2017, 12:19 AM |